| |
2022: 7
- Mehrnoosh Shakarami, James Benson and Ravi Sandhu,
Scenario-Driven Device-to-Device Access Control in Smart Home IoT.
In 4th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), Atlanta, GA, December 14-17 2022, pages 217-228.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Lopamudra Praharaj, Safwa Ameer, Maanak Gupta and Ravi Sandhu,
Attributes Aware Relationship-Based Access Control for Smart IoT Systems (Winner of Best Paper Award).
In Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing (CIC), Dec. 2022, pages 72-81.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Mohammad Nur Nobi, Ram Krishnan, Yufei Huang and Ravi Sandhu,
Administration of Machine Learning Based Access Control.
In Proceeding of the 27th European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, September 26-30, 2022, pages 189-210
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Safwa Ameer, Maanak Gupta, Smriti Bhatt and Ravi Sandhu,
Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems.
In Proceedings of the 27th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 8-10, 2022, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Tanjila Mawla, Maanak Gupta and Ravi Sandhu,
Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems.
In Proceedings of the 27th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 8-10, 2022, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Mehrnoosh Shakarami, James Benson and Ravi Sandhu,
Blockchain-Based Administration of Access in Smart Home IoT.
In Proceedings of the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 27, 2022, Baltimore, MD, pages 57-66.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Mohammad Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami and Ravi Sandhu,
Toward Deep Learning Based Access Control.
In Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (CODASPY), April 25-27, 2022, Hanover, MD, pages 10.
Presentation(pptx) (pdf)
Google Scholar Search 10+
2021: 9
- Glen Cathey, James Benson, Maanak Gupta and Ravi Sandhu,
Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems.
In Proceedings Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Virtual Event, Dec. 13-15, 2021, pages 70-79.
Presentation(pptx) (pdf)
Google Scholar Search
- John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu,
Access Control Policy Generation from User Stories Using Machine Learning.
In Proc. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 19-20, 2021, 18 pages.
Presentation(pdf)
Google Scholar Search
- Shuvra Chakraborty and Ravi Sandhu,
On Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining.
In Proc. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 19-20, 2021, 12 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Na Shi, Bo Tang, Ravi Sandhu and Qi Li,
DUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things.
In Proc. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 19-20, 2021, 12 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Maanak Gupta and Ravi Sandhu,
Towards Activity-Centric Access Control for Smart Collaborative Ecosystems.
In Proceedings of the 26th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 16-18, 2021, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Jingwen Fan, Yi Hey, Bo Tang, Qi Li and Ravi Sandhu,
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms.
In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), May 10-13, 2021, Virtual Event, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Shuvra Chakraborty and Ravi Sandhu,
Formal Analysis of ReBAC Policy Mining Feasibility.
In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY), April 26-28, 2021, Virtual Event, 11 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Safwa Ameer and Ravi Sandhu,
The HABAC Model for Smart Home IoT and Comparison to EGRBAC.
In Proceedings of the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 28, 2021, Virtual Event, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Mehrnoosh Shakarami and Ravi Sandhu,
Role-Based Administration of Role-Based Smart Home IoT.
In Proceedings of the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 28, 2021, Virtual Event, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search
2020: 7
- Smriti Bhatt and Ravi Sandhu,
Convergent Access Control to Enable Secure Smart Communities.
In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020, 9 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan,
A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions.
In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu,
ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions.
In Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing (CIC), Virtual Event, December 1-3, 2020, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Sina Sontowski, Maanak Gupta, Sai Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi and Ravi Sandhu,
Cyber Attacks on Smart Farming Infrastructure.
In Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing (CIC), Virtual Event, December 1-3, 2020, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Naiwei Liu, Meng Yu, Wanyu Zang and Ravi Sandhu,
On the Cost-Effectiveness of TrustZone Defense on ARM Platform.
In Proceedings of 21st World Conference on Information Security Applications (WISA), Virtual Event, August 26-28, 2020, 12 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Safwa Ameer, James Benson and Ravi Sandhu,
The EGRBAC Model for Smart Home IoT.
In Proceedings of the 21st IEEE Conference on Information Reuse and Integration (IRI), Virtual Event, August 11-13, 2020, 8 pages.
Presentation(pptx) (pdf)
(mp4)
Google Scholar Search
- Smriti Bhatt and Ravi Sandhu,
ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things.
In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 10-12, 2020, pages 203-212.
Presentation(pptx) (pdf)
Google Scholar Search
2019: 10
- Mehrnoosh Shakarami and Ravi Sandhu, Safety and Consistency of Mutable Attributes
Using Quotas: A Formal Analysis. In Proceedings of the 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Los Angeles, California, December 12-14, 2019, 9 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan, On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis.
In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, December 21-22, 2019, 17 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu, SDN-RBAC: An Access Control Model for SDN Controller Applications.
In Proceedings of the 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy, October 10-12, 2019, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan, On the Feasibility of Attribute-Based Access Control Policy Mining.
In Proceedings of the 20th IEEE Conference on Information Reuse and Integration (IRI), Los Angeles, California, July 30-August 1, 2019, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search
- Mehrnoosh Shakarami and Ravi Sandhu, Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis.
In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Charleston, SC, July 15-17, 2019.
Presentation(pptx) (pdf)
Google Scholar Search
- Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu, Online Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks.
In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Charleston, SC, July 15-17, 2019.
Presentation(pptx) (pdf)
Google Scholar Search
- Mehrnoosh Shakarami and Ravi Sandhu, Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems.
In Proceedings National Cyber Summit (NCS), Huntsville, Alabama, June 4-6, 2019.
Presentation(pptx) (pdf)
Google Scholar Search
- Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li and Ravi Sandhu, IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things.
In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (SACMAT), Toronto, Canada, June 4-6, 2019.
Presentation(pptx) (pdf)
Google Scholar Search
- Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars.
In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), March 25-27, 2019, Richardson, TX, pages 61-72.
Presentation(pptx) (pdf)
Google Scholar Search
- Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan, A Formal Access Control Model for SE-Floodlight Controller.
In Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFVSecurity), March 25-27, 2019, Richardson, TX, 6 pages.
Presentation(pptx) (pdf)
Google Scholar Search
2018: 4
- Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang and Ravi Sandhu, Malware Detection in Cloud Infrastructures using Convolutional Neural Networks.
In Proceedings 11th IEEE International Conference on Cloud Computing (CLOUD), San Francisco, CA, July 2-7, 2018, 8 pages.
Presentation(pdf)
Google Scholar Search 25+
- Maanak Gupta and Ravi Sandhu, Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things.
In Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 13-15, 2018, 12 pages.
Presentation(pptx) (pdf)
Google Scholar Search 25+
- Asma Alshehri, James Benson, Farhan Patwa and Ravi Sandhu, Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things.
In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), March 19-21, 2018, Tempe, Arizona.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Maanak Gupta, Farhan Patwa and Ravi Sandhu, An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem.
In Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control (ABAC), March 19-21, 2018, Tempe, Arizona.
Presentation(pptx) (pdf)
Google Scholar Search 30+
2017: 10
- Smriti Bhatt, Farhan Patwa and Ravi Sandhu, An Access Control Framework for Cloud-Enabled Wearable Internet of Things.
In Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, October 15-17, 2017, 11 pages.
Presentation(pptx) (pdf)
Google Scholar Search 30+
- Tahmina Ahmed and Ravi Sandhu, Safety of ABACα is Decidable.
In Proceedings of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August 21-23, 2017, 15 pages.
Presentation(pptx) (pdf)
Google Scholar Search 5+
- Smriti Bhatt, Farhan Patwa and Ravi Sandhu, Access Control Model for AWS Internet of Things.
In Proceedings of the 11th International Conference on Network and System Security (NSS), Helsinki, Finland, August 21-23, 2017, 15 pages.
Presentation(pptx) (pdf)
Google Scholar Search 30+
- Asma Alshehri and Ravi Sandhu, Access Control Models for Virtual Object Communication in Cloud-Enabled IoT
In Proceedings of the 18th IEEE Conference on Information Reuse and Integration (IRI), San Diego, California, August 4-7, 2017, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search 30+
- Maanak Gupta, Farhan Patwa and Ravi Sandhu, Object-Tagged RBAC Model for the Hadoop Ecosystem.
In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, Pennsylvania, July 19-21, 2017, 18 pages.
Presentation(pptx) (pdf)
Google Scholar Search 20+
- Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu, Clustering-Based IaaS Cloud Monitoring.
In Proceedings 10th IEEE International Conference on Cloud Computing (CLOUD), Honolulu, Hawaii, June 25-30, 2017, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Maanak Gupta, Farhan Patwa, James Benson and Ravi Sandhu, Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment.
In Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 21-23, 2017, pages 183-190.
Presentation(pptx) (pdf)
Google Scholar Search 20+
- Tahmina Ahmed, Ravi Sandhu and Jaehong Park, Classifying and Comparing Attribute-Based and Relationship-Based Access Control.
In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY), March 22-24, 2017, Scottsdale, Arizona.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Smriti Bhatt, Farhan Patwa and Ravi Sandhu, ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine.
In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC), March 24, 2017, Scottsdale, Arizona, 12 pages.
Presentation(pptx) (pdf)
Google Scholar Search 25+
- Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Attribute Transformation for Attribute-Based Access Control.
In Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control (ABAC), March 24, 2017, Scottsdale, Arizona, 8 pages.
Presentation(ppt) (pdf)
Google Scholar Search 10+
2016: 12
- Smriti Bhatt, Farhan Patwa and Ravi Sandhu, An Attribute-Based Access Control Extension for OpenStack and its Enforcement Utilizing the Policy Machine.
In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, November 1-3, 2016, 9 pages.
Presentation(pptx) (pdf)
Google Scholar Search 20+
- Asma Alshehri and Ravi Sandhu, Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda.
In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, November 1-3, 2016, 9 pages.
Presentation(pptx) (pdf)
Google Scholar Search 40+
- Maanak Gupta and Ravi Sandhu, The GURAG Administrative Model for User and Group Attribute Assignment.
In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 15 pages.
Presentation(pptx) (pdf)
Google Scholar Search 30+
- Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, An Attribute-Based Protection Model for JSON Documents.
In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 16 pages.
Presentation(ppt) (pdf)
Google Scholar Search 1+
- Asma Alshehri and Ravi Sandhu, On the Relationship between Finite Domain ABAM and PreUCONA.
In Proceedings of the 10th International Conference on Network and System Security (NSS), Taipei, Taiwan, September 28-30, 2016, 14 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control.
In Proceedings 19th Information Security Conference, (ISC 2016), Honolulu, Hawaii, September 7-9, 2016, 14 pages.
Presentation(ppt) (pdf)
Google Scholar Search 1+
- Tahmina Ahmed, Farhan Patwa and Ravi Sandhu, Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration.
In Proceedings of the 17th IEEE Conference on Information Reuse and Integration (IRI), Pittsburgh, Pennsylvania, July 28-30, 2016, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Navid Pustchi and Ravi Sandhu, Role-Centric Circle of Trust in Multi-Tenant Cloud IaaS.
In Proceedings 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, 16 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, A Comparison of Logical Formula and Enumerated Authorization Policy ABAC Models (with addendum).
In Proceedings 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016), Trento, Italy, July 18-21, 2016, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Yuan Cheng, Khalid Bijon and Ravi Sandhu, Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support.
In Proc. 21st ACM Symposium on Access Control Models and Technologies (SACMAT), Shanghai, China, June 6-8, 2016, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Yun Zhang, Farhan Patwa and Ravi Sandhu, Community-Based Secure Information and Resource Sharing in Azure Cloud IaaS.
In Proceedings of the 4th ACM Workshop on Security in Cloud Computing (SCC), May 30, 2016, Xi'an, China, 8 pages.
Presentation(pdf)
Google Scholar Search 1+
- Prosunjit Biswas, Ravi Sandhu and Ram Krishnan, Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy.
In Proceedings of the 1st ACM Workshop on Attribute-Based Access Control (ABAC), March 11, 2016, New Orleans, Louisiana, 12 pages.
Presentation(pptx) (pdf)
Google Scholar Search 30+
2015: 6
- Navid Pustchi and Ravi Sandhu,
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trust.
In Proceedings of the 9th International Conference on Network and System Security (NSS), New York, New York, November 3-5, 2015, 14 pages.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Yun Zhang, Farhan Patwa and Ravi Sandhu,
Community-Based Secure Information and Resource Sharing in AWS Public Cloud.
In Proceedings of the 1st IEEE International Conference on Collaboration and Internet Computing (CIC), Hangzhou, China, October 27-30, 2015, 8 pages.
Presentation(pdf)
Google Scholar Search 10+
- Yun Zhang, Farhan Patwa, Ravi Sandhu and Bo Tang,
Hierarchical Secure Information and Resource Sharing in OpenStack Community Cloud.
In Proceedings 16th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, California, August 13-15, 2015, 8 pages.
Presentation(pdf)
Google Scholar Search 10+
- Khalid Bijon, Ram Krishnan and Ravi Sandhu, Mitigating Multi-Tenancy Risks in IaaS Cloud through Constraints-Driven Virtual Resource Scheduling.
In Proc. 20th ACM Symposium on Access Control Models and Technologies (SACMAT), Vienna, Austria, June 1-3, 2015, pages 63-74.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Navid Pustchi, Ram Krishnan and Ravi Sandhu, Authorization Federation in IaaS Multi Cloud.
In Proceedings of the 3rd ACM Workshop on Security in Cloud Computing (SCC), April 14, 2015, Singapore, 9 pages.
Presentation(pptx) (pdf)
Google Scholar Search 20+
- Khalid Bijon, Ram Krishnan and Ravi Sandhu, Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service.
In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY), March 2-4, 2015, San Antonio, Texas, pages 183-194.
Presentation(ppt) (pdf)
Google Scholar Search 10+
2014: 7
- Yun Zhang, Ram Krishnan and Ravi Sandhu, Secure Information and Resource Sharing in Cloud Infrastructure as a Service.
In Proceedings of ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014), November 3, 2014, Scottsdale, AZ.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Xin Jin, Ram Krishnan and Ravi Sandhu, Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS.
In Proceedings 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Miami, Florida, October 22-25, 2014, 14 pages.
Presentation(pptx) (pdf)
Google Scholar Search 20+
- Dang Nguyen, Jaehong Park and Ravi Sandhu, Adopting Provenance-Based Access Control in OpenStack Cloud IaaS.
In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 15 pages.
Presentation (pptx) (pdf)
Google Scholar Search 10+
- Bo Tang and Ravi Sandhu, Extending OpenStack Access Control with Domain Trust.
In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 15 pages.
Presentation (pptx) (pdf)
Google Scholar Search 40+
- Khalid Bijon, Ram Krishnan and Ravi Sandhu, A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service.
In Proceedings 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, October 15-17, 2014, 12 pages.
Presentation (pptx) (pdf)
Google Scholar Search 10+
- Yuan Cheng, Jaehong Park and Ravi Sandhu, Attribute-aware Relationship-based Access Control for Online Social Networks.
In Proceedings 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria, July 14-16, 2014, 16 pages.
Presentation (pptx) (pdf)
Google Scholar Search 25+
- Lianshan Sun, Jaehong Park and Ravi Sandhu, Towards Provenance-Based Access Control with Feasible Overhead.
In Proceedings 4th International Conference on Information Science, Electronics and Electrical Engineering (ISEEE), Sapporo, Japan, April 26-28, 2014, 5 pages.
Google Scholar Search 1+
2013: 9
- Xin Jin, Ram Krishnan and Ravi Sandhu, Reachability Analysis for Role-based Administration of Attributes.
In Proceedings ACM-CCS Workshop on Digital Identity Management (DIM), Berlin, Germany, November 8, 2013, 12 pages.
Presentation(pdf)
Google Scholar Search 10+
- Khalid Bijon, Ram Krishnan and Ravi Sandhu,
A Framework for Risk-Aware Role Based Access Control.
In Proceedings 6th IEEE-CNS Symposium on Security Analytics and Automation (SAFECONFIG), Washington, DC, October 16, 2013, 8 pages.
Presentation(ppt) (pdf)
Google Scholar Search 40+
- Khalid Bijon, Ram Krishnan and Ravi Sandhu,
Towards An Attribute Based Constraints Specification Language.
In Proceedings 5th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), Washington, DC, September 8-14, 2013, 6 pages.
Presentation(ppt) (pdf)
Google Scholar Search 20+
- Bo Tang and Ravi Sandhu,
Cross-Tenant Trust Models in Cloud Computing.
In Proceedings 14th IEEE Conference on Information Reuse and Integration (IRI), San Francisco, California, August 14-16, 2013, pages 129-136.
Presentation(pptx) (pdf)
Google Scholar Search 20+
- Dang Nguyen, Jaehong Park and Ravi Sandhu,
A Provenance-based Access Control Model for Dynamic Separation of Duties (Winner
of Best Student Paper Award).
In Proceedings 11th IEEE Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 10-12, 2013, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search 25+
- Bo Tang, Qi Li and Ravi Sandhu,
A Multi-Tenant RBAC Model for Collaborative Cloud Services.
In Proceedings 11th IEEE Conference on Privacy, Security and Trust (PST), Tarragona, Spain, July 10-12, 2013, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search 50+
Notable non-academic citations: Amazon patent 2015.
- Bo Tang, Ravi Sandhu and Qi Li,
Multi-Tenancy Authorization Models for Collaborative Cloud Services.
In Proceedings 14th IEEE Conference on Collaboration Technologies and Systems (CTS), San Diego, California, May 20-24, 2013, 7 pages.
Presentation(pptx) (pdf)
Google Scholar Search 50+ ???
- Yuan Cheng, Jaehong Park and Ravi Sandhu,
Preserving User Privacy from Third-party Applications in Online Social Networks.
In Proceedings 2nd W3C Workshop on Privacy and Security in Online Social Media (PSOSM), Rio de Janeiro, Brazil, May 14, 2013, 6 pages.
Presentation(pptx) (pdf)
Google Scholar Search 30+
- Lianshan Sun, Jaehong Park, and Ravi Sandhu,
Engineering Access Control Policies for Provenance-Aware Systems.
In Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY), February 18-20, 2013, San Antonio, Texas, pages 285-292.
Presentation(pdf)
Google Scholar Search 10+
2012: 14
- Khalid Bijon, Ram Krishnan and Ravi Sandhu,
Risk-Aware RBAC Sessions.
In Proceedings 8th International Conference on Information Systems Security (ICISS 2012), December 15-19, 2012, IIT, Guwahati, India, pages 59-74.
Presentation(pptx) (pdf)
Google Scholar Search 30+
- Jose Morales, Shouhuai Xu and Ravi Sandhu,
Analyzing Malware Detection Efficiency with Multiple Anti-Malware Programs.
In Proceedings of the 1st ASE International Conference on Cyber Security (ASE 2012), December 14-16, 2012, Washington, DC, pages 56-66.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Xin Jin, Ravi Sandhu and Ram Krishnan, RABAC: Role-Centric Attribute-Based Access Control.
In Proceedings 6th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-20, 2012, pages 84-96. Published as Springer Lecture Notes in Computer Science Vol. 7531, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2012.
Presentation(pptx) (pdf)
Google Scholar Search 100+
- Khalid Bijon, Tahmina Ahmed, Ravi Sandhu and Ram Krishnan, A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders.
In Proceedings 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Pittsburgh, Pennsylvania, October 14-17, 2012, pages 200-209.
Cited Technical Report
Presentation(ppt) (pdf)
Google Scholar Search 1+
- Xin Jin, Ram Krishnan and Ravi Sandhu, A Role-Based Administration Model for Attributes.
In Proceedings of the First ACM International Workshop on Secure and Resilient Architectures and Systems (SRAS '12), Minneapolis, Minnesota, September 19, 2012, pages 7-12.
Presentation(pptx) (pdf)
Google Scholar Search 25+
- Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram Krishnan, Jaehong Park and Ravi Sandhu, Towards Provenance and Risk-Awareness in Social Computing.
In Proceedings of the First ACM International Workshop on Secure and Resilient Architectures and Systems (SRAS '12), Minneapolis, Minnesota, September 19, 2012, pages 25-30.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Yuan Cheng, Jaehong Park and Ravi Sandhu, Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships (Winner
of Best Paper Award).
In Proceedings 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), Amsterdam, Netherlands, September 3-5, 2012, 10 pages.
Presentation(pptx) (pdf)
Google Scholar Search 75+
- Dang Nguyen, Jaehong Park and Ravi Sandhu, Integrated Provenance Data for Access Control in Group-Centric Collaboration.
In Proceedings 13th IEEE Conference on Information Reuse and Integration (IRI), Las Vegas, Nevada, August 8-10, 2012, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Jaehong Park, Dang Nguyen and Ravi Sandhu, A Provenance-Based Access Control Model.
In Proceedings 10th IEEE Conference on Privacy, Security and Trust (PST), Paris, France, July 16-18, 2012, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search 90+
- Xin Jin, Ram Krishnan and Ravi Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
In Proceedings 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012, pages 41-55.
Presentation(pptx) (pdf)
Google Scholar Search 500+
- Yuan Cheng, Jaehong Park and Ravi Sandhu, A User-to-User Relationship-based Access Control Model for Online Social Networks
In Proceedings 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 11-13, 2012, pages 8-24.
Presentation(pptx) (pdf)
Google Scholar Search 90+
- Ravi Sandhu, The Authorization Leap from Rights to Attributes: Maturation or Chaos?
In Proceedings 17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, June 20-22, 2012, 2 pages.
Presentation(pptx) (pdf)
Google Scholar Search 40+
- Dang Nguyen, Jaehong Park and Ravi Sandhu, Dependency Path Patterns as the Foundation of Access Control in Provenance-Aware Systems.
In Proceedings 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2012), Boston, MA, June 14-15, 2012, 4 pages.
Presentation(pptx) (pdf)
Google Scholar Search 30+
- Khalid Bijon, Ravi Sandhu and Ram Krishnan, A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems.
In Proceedings IEEE International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012), Denver, CO, May 24th, 2012, 8 pages.
Presentation(pptx) (pdf)
Google Scholar Search 1+
2011: 7
- Ram Krishnan and Ravi Sandhu, Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing.
In Proceedings 7th International Conference on Information Systems Security (ICISS 2011), December 15-19, 2011, Jadavpur University, Kolkata, 14 pages.
Full version
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Jose Morales, Michael Main, Weiliang Luo, Shouhuai Xu and Ravi Sandhu, Building Malware Infection Trees.
In Proceedings 6th International Conference on Malicious and Unwanted Software (MALWARE), October 18-19, 2011, Fajardo, Puerto Rico.
Presentation(pptx) (pdf)
Google Scholar Search 1+
- Jaehong Park, Dang Nguyen and Ravi Sandhu, On Data Provenance in Group-centric Secure Collaboration.
In Proceedings 7th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida, October 15-18, 2011, 10 pages.
Presentation(pptx) (pdf)
(pdf as published in conference)
Google Scholar Search 10+
- Ravi Sandhu, Khalid Zaman Bijon, Xin Jin and Ram Krishnan, RT-Based Administrative Models for Community Cyber Security Information Sharing.
In Proceedings of the 6th IEEE International Workshop on Trusted Collaboration (TrustCol 2011), Orlando, Florida, October 15, 2011, 6 pages.
Presentation(pptx) (pdf)
Google Scholar Search 10+
- Savith Kandala, Ravi Sandhu and Venkata Bhamidipati, An Attribute Based Framework for Risk-Adaptive Access Control Models.
In Proceedings 6th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 22-26, 2011, 6 pages.
Presentation (ppt) (pdf)
Google Scholar Search 80+
- Jaehong Park, Ravi Sandhu and Yuan Cheng, ACON: Activity-Centric Access Control for Social Computing.
In Proceedings 6th International Conference on Availability, Reliability and Security (ARES), Vienna, Austria, August 22-26, 2011, 6 pages.
Presentation (pptx) (pdf)
Google Scholar Search 25+
- Ravi Sandhu, The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?
In Proceedings 1st ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, Texas, February 21-23, 2011, 2 pages. (Inaugural Keynote Talk.)
Presentation(ppt) (pdf)
Google Scholar Search 1+
2010: 9
- Jose Morales, Ravi Sandhu and Shouhuai Xu, Evaluating Detection and Treatment Effectiveness of Commercial Anti-malware Programs.
In Proceedings 5th International Conference on Malicious and Unwanted Software (MALWARE), October 19-20 2010, Nancy, France, pages 31-38.
Presentation(pptx) (pdf)
Google Scholar Search
- Ravi Sandhu, Ram Krishnan and Gregory White, Towards Secure Information Sharing Models for Community Cyber Security.
In Proceedings 6th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, Illinois, October 9-12, 2010, 6 pages.
Presentation(ppt) (pdf)
Google Scholar Search
- Jaehong Park, Yuan Cheng and Ravi Sandhu, Towards a Framework for Cyber Social Status Based Trusted Open Collaboration.
In Proceedings of the 5th IEEE International Workshop on Trusted Collaboration (TrustCol 2010), Chicago, Illinois, October 9, 2010, 8 pages.
Presentation(ppt) (pdf)
Google Scholar Search
- Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachary, Towards a Discipline of Mission-Aware Cloud Computing.
In Proceedings of the 2nd ACM Cloud Computing Security Workshop (CCSW 10), Chicago, Illinois, October 08, 2010, pages 13-17.
Presentation(ppt) (pdf)
Google Scholar Search ...
- Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough, Group-Centric Models for Secure and Agile Information Sharing.
In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 55-69. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Jose Morales, Erhan Kartaltepe, Shouhuai Xu and Ravi Sandhu, Symptoms-Based Detection of Bot Processes.
In Proceedings 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010, pages 229-241. Published as Springer Lecture Notes in Computer Science Vol. 6258, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search
- Jose Andre Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing and Exploiting Network Behaviors of Malware.
In Proceedings 6th International ICST Conference on Security and
Privacy in Communication Networks (SecureComm 2010), September 7-9,
2010, Singapore, pages 20-34. Published as Springer Lecture Notes of
the Institute for Computer Sciences, Social Informatics and
Telecommunications Engineering Vol. 50, Security and Privacy in
Communication Networks (S. Jajodia and J. Zhou, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search ...
- Shouhuai Xu, Haifeng Qian, FengyingWang, Zhenxin Zhan, Elisa Bertino and Ravi Sandhu, Trustworthy Information: Concepts and Mechanisms.
In Proceedings 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhaigou, China, July 15-17, 2010, pages 398-404. Published as Springer Lecture Notes in Computer Science Vol. 6184, Web-Age Information Management (Chen, L., Tang, C., Yang, J. and Gao, Y., editors), 2010.
Presentation(pdf)
Google Scholar Search
- Erhan Kartaltepe, Jose Andre Morales, Shouhuai Xu and Ravi Sandhu, Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), Beijing, China, June 22-25, 2010, pages 511-528. Published as Springer Lecture Notes in Computer Science Vol. 6123, Applied Cryptography and Network Security (Jianying Zhou and Moti Yung, editors), 2010.
Presentation(ppt) (pdf)
Google Scholar Search *
2009: 12
- Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Towards a Framework for Group-Centric Secure Collaboration.
In Proceedings 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-10.
Presentation(ppt w/animation) (pdf)
Google Scholar Search 0.1*
- Jose Morales, Areej Al-Bataineh, Shouhuai Xu and Ravi Sandhu, Analyzing DNS Activities of Bot Processes.
In Proceedings 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), Montreal, Quebec, Canada, October 13-14, 2009, pages 98-103.
Presentation(ppt) (pdf)
Google Scholar Search 0.1*
- Ram Krishnan and Ravi Sandhu, A Hybrid Enforcement Model for Group-Centric Secure Information Sharing.
In Proceedings IEEE International Conference on Computational Science and Engineering (CSE-09), Vancouver, Canada, August 29-31, 2009, pages 189-194.
Full version Presentation(ppt) (pdf)
Google Scholar Search 0*
- Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu and Weilei Han, An Access Control Language for a General Provenance Model.
In Proceedings 6th VLDB Workshop on Secure Data Management (SDM'09), August 28, 2009, Lyon, France, pages 68-88. Published as Springer Lecture Notes in Computer Science Vol. 5776, SDM 2009 (W. Jonker and M. Petkovi4c, editors), 2009.
Presentation(ppt) Presentation(pdf)
Google Scholar Search 0.5*
- Shouhuai Xu, Ravi Sandhu, and Elisa Bertino, TIUPAM: A Framework for Trustworthiness-Centric Information Sharing.
In Proceedings 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM), Purdue University, West Lafayette, June 15-19, 2009, pages 164-175. Published as Springer IFIP Advances in Information and Communication Technology Vol. 300, Trust Management III (E. Ferrari, N. Li, E. Bertino and Y. Karabulut, editors), 2009.
Presentation (ppt) Presentation (pdf)
Google Scholar Search 0.1*
- Shouhuai Xu, Qun Ni, Elisa Bertino and Ravi Sandhu, A Characterization of the Problem of Secure Provenance Management.
In Proceedings IEEE International Conference on Intelligence and Security Informatics (ISI-2009): Workshop on Assured Information Sharing (WAIS), June 8-11, 2009, Dallas, Texas, pages 310-314.
Presentation (ppt) Presentation (pdf)
Google Scholar Search 0.1*
- Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, Foundations for Group-Centric Secure Information Sharing Models.
In Proceedings 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3-5, 2009, pages 115-124.
Presentation(ppt) Presentation(pdf)
Techreport(citation [19])
Google Scholar Search 0.1* +++
- Ravi Sandhu, The PEI Framework for Application-Centric Security.
In Proceedings 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009. Invited Lecture
Presentation
Google Scholar Search 0.1*
Also published as: Ravi Sandhu, The PEI Framework for Application-Centric Security.
In Proceedings 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Crystal City, Virginia, November 11-14, 2009, pages 1-5.
Presentation(ppt) (pdf)
Google Scholar Search -*
- Ram Krishnan and Ravi Sandhu, Enforcement Architecture and Implementation Model for Group-Centric Information Sharing.
In Proceedings 1st IEEE International Workshop on Security and Communication Networks (IWSCN), Trondheim, Norway, May 20-22, 2009.
Presentation
Google Scholar Search 0*
- Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A First Step Towards Characterizing Stealthy Botnets.
In Proceedings of 4th International Conference on Availability, Reliability and Security (ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 106-113.
Presentation
Google Scholar Search 0*
- Justin Leonard, Shouhuai Xu, and Ravi Sandhu, A Framework for Understanding Botnets.
In Proceedings of 3rd International Workshop on Advances in Information Security (WAIS at ARES), Fukuoka Institute of Technology, Fukuoka, Japan, March 16-19, 2009, pages 917-922.
Presentation
Google Scholar Search 0.1*
- Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough, A Conceptual Framework for Group-Centric Secure Information Sharing.
In Proceedings 4th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Sydney, Australia, March 10-12, 2009, pages 384-387.
Full version.
Presentation
Google Scholar Search 0.1*
2008: 6
- Ram Krishnan, Jianwei Niu, Ravi Sandhu and William Winsborough, Stale-Safe Security Properties for Group-Based Secure Information Sharing.
In Proceedings 6th ACM-CCS Workshop on Formal Methods in Security Engineering (FMSE), Alexandria, Virginia, October 27, 2008, pages 53-62.
Full version.
Presentation
Google Scholar Search 0.1*
- Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi
Sandhu, William Winsborough and Bhavani Thuraisingham, ROWLBAC: Representing Role Based Access Control in OWL. In Proceedings 13th ACM
Symposium on Access Control Models and Technologies (SACMAT), Estes
Park, Colorado, June 11-13, 2008, pages 73-82.
Presentation
Google Scholar Search 2*
- Xinwen Zhang, Jean-Pierre Seifert and Ravi Sandhu, Security Enforcement Model for
Distributed Usage Control In Proceedings 2nd IEEE
International Conference on Sensor Networks, Ubiquitous, and
Trustworthy Computing (SUTC), Taichung, Taiwan, June 11-13, 2008,
pages 10-18.
Presentation
Keynote Lecture
Google Scholar Search 0.1*
- Vana Kalogeraki, Dimitrios Gunopulos, Ravi Sandhu and
Bhavani Thuraisingham, QoS
Aware Dependable Distributed Stream Processing. In Proceedings 11th IEEE Symposium on Object Oriented
Real-Time Distributed Computing (ISORC), Orlando, Florida, May 5-7,
2008, pages 69-75.
Presentation
Google Scholar Search 0*
- Ravi Sandhu and Venkata Bhamidipati, The ASCAA Principles for
Next-Generation Role-Based Access Control . In Proceedings 3rd
International Conference on Availability, Reliability and Security
(ARES), Barcelona, Spain, March 4-7, 2008, pages xxvii-xxxii.
Presentation
Keynote Lecture
Google Scholar Search 0.1*
- Xinwen Zhang, Dongyu Liu, Songqing Chen, Zhao Zhang and Ravi
Sandhu, Towards Digital Rights
Protection in BitTorrent-like P2P Systems. In Proceedings15th SPIE/ACM Multimedia Computing and Networking
(MMCN), San Jose, CA USA, January 30-31, 2008, pages 68180F 1-12.
Presentation
Google Scholar Search 0.1*
2007: 7
- Manoj Sastry, Ram Krishnan and Ravi Sandhu, A New Modeling Paradigm for
Dynamic Authorization in Multi-domain Systems.
In Proceedings Fourth International Conference on Mathematical Methods,
Models, and Architectures for Computer Network Security, MMM-ACNS,
Saint Petersburg, Russia, September 13-15, 2007. Published as
Springer-Verlag Communications in Computer and Information Science,
Volume 1, pages 153-158.
Full version.
Presentation
Google Scholar Search
- Shouhuai Xu and Ravi Sandhu, A Scalable and Secure
Cryptographic Service. In Proceedings 21st IFIP WG 11.3 Working Conf. on
Data and Applications Security, Redondo Beach, CA, July 8-11, 2007,
pages 144-160. Published as Springer-Verlag Lecture Notes in
Computer Science Vol. 4602, Data and Applications Security XXI
(S. Barker and G. Ahn, editors), 2007.
Full version.
Presentation
Google Scholar Search
- Baoxian Zhao, Ravi Sandhu, Xinwen Zhang and Xiaolin Qin, Towards a Times-Based Usage
Control Model. In Proceedings 21st IFIP WG 11.3 Working Conf. on Data
and Applications Security, Redondo Beach, CA, July 8-11, 2007, pages
227-242. Published as Springer-Verlag
Lecture Notes in Computer Science Vol. 4602, Data and Applications
Security XXI (S. Barker and G. Ahn, editors), 2007.
Presentation
Google Scholar Search
- Ezedin Barka and Ravi Sandhu, Framework for Agent-Based Role
Delegation. In Proceedings IEEE International Conference on
Communications (ICC), Glasgow, Scotland, June 24-28, 2007, pages 1361-1367.
Presentation
Google Scholar Search
- Min Xu, Xuxian Jiang, Ravi Sandhu and Xinwen Zhang, Towards a VMM-based Usage Control
Framework for OS Kernel Integrity Protection. In Proceedings 12th ACM Symposium on Access Control Models and
Technologies (SACMAT), June 20-22, 2007, Sophia Antipolis, France,
pages 71-80.
Presentation
Google Scholar Search **
- Ram Krishnan, Ravi Sandhu and Kumar Ranganathan, PEI Models towards
Scalable, Usable and High-Assurance Information Sharing.
In Proceedings 12th ACM Symposium on Access Control Models and Technologies
(SACMAT), June 20-22, 2007, Sophia Antipolis, France, pages
145-150.
Full version.
Presentation
Google Scholar Search ...
- Xinwen Zhang, Michael Covington, Songqing Chen and Ravi Sandhu, SecureBus: Towards Application-Transparent Trusted Computing with Mandatory Access Control, AsiaCCS 2007. Presentation
Google Scholar Search
2006: 6
- Zhixiong Zhang, Xinwen Zhang and Ravi Sandhu,
ROBAC: Scalable Role and Organization Based Access Control Models, Proceedings of the 1st IEEE International Workshop on Trusted Collaboration (TrustCol 2006), Atlanta, Georgia, November 17, 2006, 9 pages.
Google Scholar Search
- Xinwen Zhang, Francesco Parisi-Presicce, and Ravi Sandhu,
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, IWSEC 2006.
Presentation
Google Scholar Search
- Xinwen Zhang, Masayuki Nakae, Michael Covington and Ravi Sandhu, A Usage-based Authorization Framework for Collaborative Computing Systems, SACMAT 2006.
Presentation
Google Scholar Search *
- Ravi Sandhu, Kumar Ranganathan and Xinwen Zhang, Secure Information Sharing Enabled by Trusted Computing and PEI Models (Invited Talk), AsiaCCS 2006.
Presentation
Google Scholar Search 100+
- Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce, Safety
Analysis of Usage Control Authorization Models, AsiaCCS 2006. Presentation
Google Scholar Search ...
- Masayuki Nakae, Xinwen Zhang and Ravi Sandhu, A General Design Towards Secure Ad-Hoc Collaboration, AsiaCCS, 2006.
Google Scholar Search
2005: 1
- Ravi Sandhu and Xinwen Zhang, Peer-to-Peer
Access Control Architecture Using Trusted Computing Technology, SACMAT
2005.
Presentation
Google Scholar Search **
2004: 8
- Ezedin Barka and Ravi Sandhu, Role-Based
Delegation Model/ Hierarchical Roles (RBDM1), ACSAC 2004.
Google Scholar Search *
- Mohammad Al-Kahtani and Ravi Sandhu, Rule-Based
RBAC with Negative Authorization, ACSAC 2004.
Google Scholar Search *
- Ravi Sandhu, A Perspective on
Graphs and Access Control Models , ICGT 2004.
Presentation
Google Scholar Search
- Jaehong Park, Xinwen Zhang, and Ravi Sandhu, Attribute
Mutability in Usage Control, IFIP11.3 2004.
Presentation
Google Scholar Search *
- Roshan Thomas and Ravi Sandhu, Towards a Multi-dimensional Characterization of Dissemination Control, POLICY, 2004.
Google Scholar Search
- Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi Sandhu, A Logical Specification for Usage
Control, SACMAT 2004.
Presentation
Google Scholar Search **
- S. Xu, W. Nelson Jr. and R. Sandhu, Enhancing
Anonymity via Market Competition, Information Assurance and Security
-- IEEE ITCC 2004.
Google Scholar Search
- Roshan Thomas and Ravi Sandhu, Models,
Protocols, and Architectures for Secure Pervasive Computing: Challenges
and Research Directions, IEEE PerSec'04.
Google Scholar Search ...
2003: 5
- Ravi Sandhu and Jaehong Park, Usage
Control: A Vision for Next Generation Access Control, MMM-ACNS 2003.
Presentation
Google Scholar Search ***
- Xinwen Zhang, Jaehong Park and Ravi Sandhu, Schema
based XML Security: RBAC Approach, IFIP11.3 2003.
Google Scholar Search ...
- Xinwen Zhang, Sejong Oh and Ravi Sandhu, PBDM:
A Flexible Delegation Model in RBAC, SACMAT 2003.
Presentation
Google Scholar Search ***
- Mohammad A. Al-Kahtani and Ravi Sandhu, Induced Role Hierarchies with
Attribute-Based RBAC, SACMAT 2003.
Presentation
Google Scholar Search *
- Shouhuai Xu and Ravi Sandhu. Two
Efficient and Provably Secure Schemes for Server-Assisted Threshold
Signatures, RSA-CT 2003.
Presentation
Google Scholar Search
2002: 6
- Ravi Sandhu, Mihir Bellare, and Ravi Ganesan, Password
Enabled PKI: Virtual Smartcards vs. Virtual Soft Tokens, PKIRW
2002.
Presentation
Google Scholar Search 0.5*
- Mohammad A. Al-Kahtani and Ravi Sandhu, A Model for Attribute-Based
User-Role Assignment, ACSAC 2002.
Presentation
Google Scholar Search 2*
- Sejong
Oh, Ravi S. Sandhu, A Model for
Role Administration Using Organization Structure, SACMAT 2002.
Presentation
Google Scholar Search 2*
- Jaehong Park and Ravi Sandhu, Towards
Usage
Control Models: Beyond Traditional Access Control, SACMAT 2002.
Presentation
Google Scholar Search 4*
- Jaehong Park and Ravi Sandhu, Originator
Control in Usage Control, POLICY 2002.
Google Scholar Search 0.5*
- Shouhuai Xu and Ravi Sandhu, Authenticated
Multicast Immune to Denial-of-Service Attack, SAC 2002.
Google Scholar Search 0.1*
2001: 4
- Pete Epstein and Ravi Sandhu, Engineering
of Role-Permission Assignments, ACSAC
2001.
Google Scholar Search 0.5*
- Joon Park, Gail-Joon Ahn and
Ravi Sandhu, Role-based Access
Control on the Web Using LDAP, IFIP11.3 2001.
Google Scholar Search 0*
- Savith Kandala and Ravi Sandhu, Secure
Role-Based Workflow Models, IFIP11.3 2001.
Google Scholar Search 0.5*
- Ravi Sandhu, Future
Directions in Role-Based Access Control Models , MMM-ACNS 2001.
Presentation
Google Scholar Search 0.5*
2000: 8
- Ezedin Barka and Ravi Sandhu, Framework
for Role-Based Delegation Models, ACSAC 2000.
Presentation
Google Scholar Search
- Jaehong Park, Ravi Sandhu and James Schifalacqua, Security
Architectures for Controlled Digital Information Dissemination, ACSAC 2000.
Presentation
Google Scholar Search
- Joon S. Park and Ravi Sandhu, Binding
Identities and Attributes Using Digitally Signed Certificates, ACSAC 2000.
Google Scholar Search
- Ezedin Barka and Ravi Sandhu, A
Role-Based Delegation Model and Some Extensions, NISSC 2000.
Presentation
Google Scholar Search
- Venkata Bhamidipati and Ravi Sandhu, Push
Architectures for User-Role Assignment, NISSC
2000.
Google Scholar Search
- Ravi Sandhu, Engineering
Authority and Trust in Cyberspace: The OM-AM and RBAC Way, ACM RBAC 2000.
Presentation
Google Scholar Search
- Ravi Sandhu, David Ferraiolo and Richard Kuhn, The
NIST Model for Role-Based Access Control: Towards A Unified Standard, ACM RBAC 2000.
Google Scholar Search
- Gail-Joon Ahn, Myong Kang, Joon Park and Ravi Sandhu, Injecting
RBAC to Secure a Web-Based Workflow System, ACM RBAC 2000.
Presentation
Google Scholar Search
1999: 8
- Gail-Joon Ahn and Ravi Sandhu, The RSL99 Language for Role-Based Separation of Duty Constraints,
ACM RBAC 1999.
Google Scholar Search
- Pete Epstein and Ravi Sandhu, Towards
a UML Based Approach to Role Engineering, ACM RBAC 1999.
Google Scholar Search
- Joon S. Park and Ravi Sandhu, RBAC
on the Web by Smart Certificates, ACM
RBAC 1999.
Google Scholar Search
- Ravi Sandhu and Qamar Munawer, Simulation
of the Augmented Typed Access Matrix Model (ATAM) Using Roles, INFOSECU 1999.
Google Scholar Search
- Ravi Sandhu and Qamar Munawer, The
ARBAC99 Model for Administration of Roles, ACSAC 1999.
Presentation
Google Scholar Search
- Joon S. Park and Ravi Sandhu, Smart
Certificates: Extending X.509 for Secure Attribute Service on the Web, NISSC 1999.
Presentation
Google Scholar Search
- Joon Park, Ravi Sandhu, and SreeLatha Ghanta, RBAC
on the Web by Secure Cookies, IFIP11.3 1999.
Google Scholar Search
- Savith Kandala and Ravi Sandhu, Extending
the BFA Workflow Authorization Model to Express Weighted Voting, IFIP11.3 1999.
Google Scholar Search
1998: 10
- Philip Hyland and Ravi Sandhu, Concentric
Supervision of Security Applications: A New Security Management Paradigm,
ACSAC 1998.
Google Scholar Search
- Ravi Sandhu and Gail-Joon Ahn, Group
Hierarchies with Decentralized User Assignment in Windows NT, IASTED-CSE 1998.
Google Scholar Search
- Ravi Sandhu and Qamar Munawer, The
RRA97 Model for Role-Based Administration of Role Hierarchies, ACSAC 1998.
Google Scholar Search
- Ravi Sandhu and Qamar Munawer, How
to do Discretionary Access Control Using Roles, ACM RBAC 1998.
Presentation
Google Scholar Search
-
Ravi Sandhu, Role Activation Hierarchies,
ACM RBAC 1998.
Presentation
Google Scholar Search
- Ravi Sandhu and Venkata Bhamidipati, An Oracle Implementation of the PRA97
Model for Permission-Role Assignment, ACM RBAC 1998.
Presentation
Google Scholar Search
- Ravi Sandhu and Joon S. Park, Decentralized User-Role Assignment for
Web-based Intranets, ACM RBAC 1998.
Google Scholar Search
- Philip Hyland and Ravi Sandhu, Management of Network Security
Applications, NISSC 1998.
Google Scholar Search
- Ravi Sandhu and Gail-Joon Ahn, Decentralized Group Hierarchies in
UNIX: An Experiment and Lessons Learned, NISSC 1998.
Google Scholar Search
- Chandramouli Ramaswamy and Ravi Sandhu, Role-Based Access Control Features in
Commercial Database Management Systems (Winner
of Best Paper Award), NISSC 1998.
Google Scholar Search
1997: 4
- Tarik Himdi and Ravi Sandhu, Lattice Based Models for Controlled
Sharing of Confidential Information in The Saudi Hajj System,
ACSAC 1997.
Google Scholar Search
-
Ravi Sandhu, Venkata Bhamidipati,
Edward Coyne, Srinivas Ganta and Charles Youman, The ARBAC97 Model for Role-Based
Administration of Roles: Preliminary Description and Outline,
ACM RBAC 1997.
Presentation
Google Scholar Search
- Ravi Sandhu and Venkata Bhamidipati, The
URA97 Model for Role-Based User-Role Assignment, IFIP11.3 1997.
Presentation
Google Scholar Search
- Roshan Thomas and Ravi Sandhu, Task-based
Authorization Controls (TBAC): A Family of Models for Active and
Enterprise-oriented Authorization Management, IFIP11.3 1997.
Google Scholar Search
1996: 2
-
Ravi Sandhu, Role Hierarchies and Constraints for
Lattice-Based Access Controls, ESORICS 1996.
Presentation
Google Scholar Search 250+
-
Ravi Sandhu, Access Control: The Neglected Frontier
(Keynote
Lecture), ACISP 1996.
Presentation
Google Scholar Search 50+
1995: 6
- Ravi Sandhu, Issues in RBAC, ACM RBAC
1995.
Google Scholar Search
- Ravi Sandhu, Roles Versus Groups, ACM
RBAC 1995.
Google Scholar Search
-
Ravi Sandhu, Rationale for the RBAC96 Family of
Access Control Models, ACM RBAC 1995.
Google Scholar Search
-
Fang Chen and Ravi Sandhu, Constraints for Role-Based Access Control,
ACM RBAC 1995.
Google Scholar Search
-
Jeremy Epstein and Ravi Sandhu, NetWare 4 as an Example of Role-Based Access Control,
ACM RBAC 1995.
Google Scholar Search
-
Fang Chen and Ravi Sandhu, The Semantics and Expressive Power of
the MLR Data Model, OAKLAND 1995.
Google Scholar Search
1994: 7
-
Roshan Thomas and Ravi Sandhu, Conceptual Foundations for a Model of
Task-based Authorizations, CSFW 1994.
Google Scholar Search
-
Ravi Sandhu, Edward Coyne, Hal
Feinstein and Charles Youman, Role-Based Access Control: A
Multi-Dimensional View, ACSAC 1994.
Presentation
Google Scholar Search
-
Ravi Sandhu and Srinivas Ganta, On the Expressive Power of the Unary
Transformation Model, ESORICS 1994.
Presentation
Google Scholar Search
-
Roshan Thomas and Ravi Sandhu, Supporting Object-based High-assurance
Write-up in Multilevel databases for the Replicted Architecture,
ESORICS 1994.
Google Scholar Search
-
Ravi Sandhu and Hal Feinstein, A Three Tier Architecture for
Role-Based Access Control, NCSC 1994.
Presentation
Google Scholar Search
-
Paul Ammann and Ravi Sandhu, One-Representative Safety Analysis in
the Non-Monotonic Transform Model, CSFW 1994.
Google Scholar Search
-
Ravi Sandhu and Srinivas Ganta, On the Minimality of Testing for
Rights in Transformation Models, OAKLAND 1994.
Google Scholar Search
1993: 9
-
Roshan Thomas and Ravi Sandhu, Towards a Task-Based Paradigm for
Flexible and Adaptable Access Control in Distributed
Applications, NSP 1993.
Google Scholar Search 50+
- Roshan Thomas and Ravi Sandhu, Concurrency,
Synchronization, and Scheduling to Support High-assurance Write-up in
Multilevel Object-based Computing, OOPSLA Workshop 1993.
Google Scholar Search 1+
-
Ravi Sandhu and Srinivas Ganta, Expressive Power of the Single-Object
Typed Access Matrix Model, ACSAC 1993.
Google Scholar Search 1+
-
Ravi Sandhu and Sushil Jajodia, Referential Integrity in Multilevel
Secure Databases, NCSC 1993.
Google Scholar Search 10+
-
Roshan Thomas and Ravi Sandhu, Discretionary Access Control in
Object-Oriented Databases: Issues and Research Directions, NCSC
1993.
Google Scholar Search 25+
-
Roshan Thomas and Ravi Sandhu, Task Based Authorization: A Paradigm
for Flexible and Adaptable Access Control in Distributed
Applications, NCSC 1993.
Google Scholar Search 1+
- Ravi Sandhu, On Five Definitions of Data
Integrity, IFIP11.3 1993.
Presentation
Google Scholar Search 50+
- Roshan Thomas and Ravi Sandhu, Towards a
Unified Framework and Theory for Reasoning about Security and Correctness of
Multilevel Transactions, IFIP11.3 1993.
Google Scholar Search 1+
-
Ravi Sandhu and Srinivas Ganta, On Testing for Absence of Rights in
Access Control Models, CSFW 1993.
Google Scholar Search 25+
1992: 8
-
Paul Ammann and Ravi Sandhu, Implementing Transaction Control
Expressions by Checking for Absence of Access Rights, ACSAC 1992.
Google Scholar Search 25+
-
Ravi Sandhu and Sushil Jajodia, Polyinstantiation for Cover Stories,
ESORICS 1992.
Google Scholar Search 50+
-
Ravi Sandhu, A Lattice Interpretation of the
Chinese Wall Policy, NCSC 1992.
Google Scholar Search 50+
-
Ravi Sandhu and Gurpreet Suri, Implementation Considerations for the
Typed Access Matrix Model in a Distributed Environment (Winner
of Outstanding Paper Award), NCSC 1992.
Google Scholar Search 25+
-
Ravi Sandhu, The Typed Access Matrix Model,
OAKLAND 1992.
Google Scholar Search 350+
-
Ravi Sandhu and Gurpreet Suri, Non-Monotonic Transformations of
Access Rights, OAKLAND 1992.
Google Scholar Search 25+
- Roshan Thomas and Ravi Sandhu, Implementing
the Message Filter Object-oriented Security Model without Trusted Subjects, IFIP11.3 1992.
Google Scholar Search 10+
-
Paul Ammann, Richard Lipton and Ravi
Sandhu, The Expressive Power of Multi-Parent
Creation in Monotonic Access Control Models, CSFW 1992.
Google Scholar Search 10+
1991: 10
-
John McDermott, Sushil Jajodia and
Ravi Sandhu, A Single-Level Scheduler for the
Replicated Architecture for Multilevel Secure Databases, ACSAC
1991.
Google Scholar Search 150+
-
Paul Ammann, Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the
Extended Schematic Protection Model, ACSAC 1991.
Google Scholar Search 10+
- Ravi Sandhu, Roshan Thomas and Sushil Jajodia, Supporting
Timing Channel Free Computations in Multilevel Secure Object-Oriented
Databases, IFIP11.3 1991.
Google Scholar Search 10+
-
Ravi Sandhu and Sushil Jajodia, Honest Databases That Can Keep Secrets,
NCSC 1991.
Google Scholar Search 25+
-
Ravi Sandhu and Gurpreet Suri, A Distributed Implementation of the
Transform Model, NCSC 1991.
Google Scholar Search 1+
-
Ravi Sandhu, Roshan Thomas and Sushil
Jajodia, A Secure Kernelized Architecture for
Multilevel Object-Oriented Databases, CSFW 1991.
Google Scholar Search 10+
-
Edgar Sibley, James Michael and Ravi
Sandhu, A Case Study of Security Policy for
Manual and Automated Systems, COMPASS 1991.
Google Scholar Search 1+
-
Sushil Jajodia and Ravi Sandhu, Toward a Multilevel Secure Relational
Data Model, SIGMOD 1991.
Google Scholar Search 250+
-
Paul Ammann and Ravi Sandhu, Safety Analysis for the Extended
Schematic Protection Model, OAKLAND 1991.
Google Scholar Search 50+
-
Sushil Jajodia and Ravi Sandhu, A Novel Decomposition of Multilevel
Relations into Single-Level Relations, OAKLAND 1991.
Google Scholar Search 25+
1990: 8
-
Paul Ammann and Ravi Sandhu, Extending the Creation Operation in
the Schematic Protection Model, ACSAC 1990.
Google Scholar Search 25+
-
Sushil Jajodia, Ravi Sandhu and Edgar
Sibley, Update Semantics for Multilevel
Relations, ACSAC 1990.
Google Scholar Search 25+
-
Ravi Sandhu and Sushil Jajodia, Integrity Mechanisms in Database
Management Systems, NCSC 1990.
Google Scholar Search 25+
-
Ravi Sandhu and Sushil Jajodia, Polyinstantiation Integrity in
Multilevel Relations, OAKLAND 1990.
Google Scholar Search 100+
- Ravi Sandhu, Separation of Duties in
Computerized Information Systems, IFIP11.3 1990.
Google Scholar Search 150+
- Sushil Jajodia and Ravi Sandhu, Polyinstantiation Integrity in Multilevel
Relations Revisited,, IFIP11.3 1990.
Google Scholar Search 1+
-
Ravi Sandhu, Sushil Jajodia and Teresa
Lunt, A New Polyinstantiation Integrity
Constraint for Multilevel Relations, CSFW 1990.
Google Scholar Search 25+
-
Sushil Jajodia and Ravi Sandhu, A Formal Framework for Single Level
Decomposition of Multilevel Relations, CSFW 1990.
Google Scholar Search 10+
1989: 3
- Ravi Sandhu, Mandatory Controls for
Database Integrity, IFIP11.3 1989.
Google Scholar Search 25+
-
Ravi Sandhu, Transformation of Access Rights,
OAKLAND 1989.
Google Scholar Search 25+
-
Ravi Sandhu, Terminology, Criteria and System
Architectures for Data Integrity, IWDI 1989.
Google Scholar Search 10+
1988: 1
-
Ravi Sandhu, Transaction Control Expressions for
Separation of Duties, ACSAC 1988.
Google Scholar Search 200+
1987: 1
-
Ravi Sandhu, On Some Cryptographic Solutions for
Access Control in a Tree Hierarchy, ACM-IEEE 1987.
Google Scholar Search 50+
1986: 1
-
Ravi Sandhu and Micheal Share, Some Owner-Based Schemes with Dynamic
Groups in the Schematic Protection Model, OAKLAND 1986.
Google Scholar Search 10+
1985: 1
-
Ravi Sandhu, Analysis of Acyclic Attenuating
Systems for the SSR Protection Model, OAKLAND 1985.
Google Scholar Search 1+
1984: 1
-
Ravi Sandhu, The SSR Model for Specification of
Authorization Policies: A Case Study in Project Control, COMPSAC 1984.
Google Scholar Search 1+
|